{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Cisco Unified Contact Center Enterprise (ou IPCC) 6.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Unified Contact Center Enterprise (ou IPCC) 7.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Unified Contact Center Hosted (ou IPCC) 7.x.","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Unified Contact Center Enterprise (ou IPCC) 5.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Unified Contact Center Hosted (ou IPCC) 6.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Unified Contact Center Hosted (ou IPCC) 5.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 dans un composant de Cisco Unified Contact Center\nappel\u00e9 JTapi Gateway Server permet \u00e0 un utilisateur mal intentionn\u00e9\ndisposant d'un acc\u00e8s au r\u00e9seau local de provoquer un d\u00e9ni de service\nemp\u00eachant toute l'application IPCC de fonctionner normalement.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Cisco ID 20070110-jtapi du 10 janvier    2007 :","url":"http://www.cisco.com/warp/public/707/cisco-sa-20070110-texte.shtml"}],"reference":"CERTA-2007-AVI-028","revisions":[{"description":"version initiale.","revision_date":"2007-01-12T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans Cisco Unified Contact Center aussi appel\u00e9 IPCC\npermet \u00e0 un utilisateur distant de provoquer un d\u00e9ni de service.\n","title":"Vuln\u00e9rabilit\u00e9 dans Cisco Unified Contact Center","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco #20070110-jtapi","url":null}]}
